adding material

This commit is contained in:
stephensottosanti
2021-01-22 23:30:00 -06:00
parent fef41682a0
commit 8d13e8d632
15 changed files with 102 additions and 42 deletions

View File

@@ -0,0 +1,86 @@
# Where to Start
<p>You are probably here because this is all brand new to you and you want to learn what cybersecurity is all about! Here you will find links to resources that will hopefully provide you with the information you are looking for. If you are just starting out, it is time to learn the basics.</p>
<br>
## YouTube
You won't find a better place full of videos to get you started than YouTube. So many different channels
with great content and individuals that wan't to educate others and teach people the important aspects
of the cyber security world. The following are links to youtube videos that are worth checking out!
### What is Cybersecurtiy?
"Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These
cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money
from users; or interrupting normal business processes.
Implementing effective cybersecurity measures is particularly challenging today because there are more
devices than people, and attackers are becoming more innovative." - CISCO<br>
[Watch a cyberattack unfold](https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html?socialshare=lightbox1)<br>
<br>
Learn From YouTube:<br>
[What is Cybersecurity?](https://www.youtube.com/watch?v=2mh-N9_O_yI)<br>
Cyberactive Security<br>
[Cybersecurity 101](https://www.youtube.com/watch?v=sdpxddDzXfE)<br>
NOVA PBS Official<br>
[Why Cybersecurity is Important!](https://www.youtube.com/watch?v=JIJslcA8Q5g)<br>
TEDx Talks<br>
[Beginner Tips, Certifications and Career Paths](https://www.youtube.com/watch?v=xzDKM7eEweI)<br>
Infosec<br>
[What Security Job Should I get?](https://www.youtube.com/watch?v=R_-K_TwsbOE)<br>
Cyberactive Security<br>
Here is a nice beginners guide to cybersecurity<br>
[Beginner's Guide](https://techbootcamps.rice.edu/blog/the-beginners-guide-to-cybersecurity/) <br>
<br>
### <b>Command Line Interface (CLI)</b>
<p>You will be spending a lot of time with the command line interface (CLI). Therefore, it is important that you understand why and how to use it. </p>
[What is Command Line Interface](https://www.w3schools.com/whatis/whatis_cli.asp)<br>
<p>The following are great links lists of linux as well as bash commands and how to use them. They are important to know and will help you out a lot along the way.</p>
[Linux Commands Explained](https://www.mediacollege.com/linux/command-tutorial/) <br>
[Table of Linux Commands](https://www.mediacollege.com/linux/command/shell-command.html) <br>
[Table of Bash Shell Commands](https://www.mediacollege.com/linux/command/linux-command.html) <br>
[Bash Reference Manual](https://tiswww.case.edu/php/chet/bash/bashref.html) <br>
<br>
<p>The following link takes you to a great website where you can practice using the above commands and the even teach you how use them. They want you to learn!</p>
[Over the wire](https://overthewire.org/wargames/bandit/) <br>
<br>
### <b>Virtual Machines and Virtualbox</b>
<p>Along with the CLI another important topic is the Virtual Machine (VM). Virtual machines get used a lot when learning cybersecurity and throughout your cybersecurity career! It is definitely very important to know. The following link will take you to a great description and video describing what a virtual machine is.</p>
[What is a virtual machine](https://www.ibm.com/cloud/learn/virtual-machines)
<p>The hypervisor we typically use is VirtualBox, the following is a link to the main website where you can learn more about it. Downloading it is very straightfoward, click the big blue button!</p>
[VirtualBox](https://www.virtualbox.org/) <br>
### <b>Introduction Material</b>
Here are some other links to videos I think will be helpful. Obviously, from YouTube.<br>
This crash course is great and can answer some of the million questions you probably have since this is all new to you.<br>
[Crash Course for Computer Science](https://www.youtube.com/watch?v=tpIctyqH29Q&list=PL8dPuuaLjXtNlUrzyH5r6jN9ulIgZBpdo) <br>
[What is Linux?](https://www.youtube.com/watch?v=zA3vmx0GaO8) <br>
[Unix vs Linux](https://www.youtube.com/watch?v=jowCUo_UGts) <br>
[What is a Linux Distro?](https://www.youtube.com/watch?v=6gqLWTSz6ck)<br>
[What is Ubuntu?](https://www.youtube.com/watch?v=SDMQxLblarE) <br>
[What is Kali Linux?](https://www.youtube.com/watch?v=aHy1d4T7jh8)

2
1_Beginner/README.md Normal file
View File

@@ -0,0 +1,2 @@
# Beginner
You have a good grasp at what cybersecurity is and what it entails. You are at least familiar with everything covered in the [where_to_start directory](/0_Where_To_Start) and are ready to start learning more. If you are not familiar with everything covered in the basics then what are you doin? Get out of here, go learn the basics! They're important! Continuing, here you will find resources to help get you ready for the big leagues.

View File

@@ -1,36 +0,0 @@
# Beginner's Guide
Welcome to the beginner's directory. Here you can find all sorts of links and resources to help get
you started with your career in cyber security!
## Youtube
You won't find a better place full of videos to get you started than youtube. So many different channels
with great content and individuals that wan't to educate others and teach people the important aspects
of the cyber security world. The following are links to youtube videos that are worth checking out!
### What is Cyber Securtiy?
"Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These
cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money
from users; or interrupting normal business processes.
Implementing effective cybersecurity measures is particularly challenging today because there are more
devices than people, and attackers are becoming more innovative." - CISCO<br/>
[Watch a cyberattack unfold](https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html?socialshare=lightbox1)<br/>
<br/>
Learn From Youtube:<br/>
[What is Cyber Security?](https://www.youtube.com/watch?v=2mh-N9_O_yI)<br/>
Cyberactive Security<br/>
[Cybersecurity 101](https://www.youtube.com/watch?v=sdpxddDzXfE)<br/>
NOVA PBS Official<br/>
[Why Cybersecurity is Important!](https://www.youtube.com/watch?v=JIJslcA8Q5g)<br/>
TEDx Talks<br/>
[Beginner Tips, Certifications and Career Paths](https://www.youtube.com/watch?v=xzDKM7eEweI)<br/>
Infosec<br/>
[What Security Job Should I get?](https://www.youtube.com/watch?v=R_-K_TwsbOE)<br/>
Cyberactive Security

View File

@@ -3,7 +3,7 @@ Welcome! Everyone from begginer level to advanced are welcome and encouraged to
the competition team. It is a great opportunity to learn more about cyber security
and really dive deep into what it takes to solve complex cyber security problems.
Here you will find resources on CTFs and other competitions. New to cyber competitions?
Check out the resources within the [Where_to_Start](/Compete/Where_to_Start) directory.<br/>
Check out the resources within the [Where_to_Start](/Competition_Prep/Where_to_Start) directory.<br/>
# Before You Start!
If you are looking to start solving your own challenges and learning about how to compete,
@@ -19,8 +19,8 @@ Checkout each individual CTF topic's directory and learn more about them and fin
which tools you can be using right now to help you with solving CTF challenges!<br/>
Different topics you might come across in a CTF event include:<br/>
[Forensics](/Compete/CTF/Forensics)<br/>
[Cryptography](/Compete/CTF/Cryptography)<br/>
[Web Exploitation](/Compete/CTF/Web_Exploitation)<br/>
[Reverse Engineering](/Compete/CTF/Reverse_Engineering)<br/>
[Binary Exploitation](/Compete/CTF/Binary_Exploitation)<br/>
[Forensics](/Competition_Prep/CTF/Forensics)<br/>
[Cryptography](/Competition_Prep/CTF/Cryptography)<br/>
[Web Exploitation](/Competition_Prep/CTF/Web_Exploitation)<br/>
[Reverse Engineering](/Competition_Prep/CTF/Reverse_Engineering)<br/>
[Binary Exploitation](/Competition_Prep/CTF/Binary_Exploitation)<br/>

View File

@@ -0,0 +1 @@
# Popular Resources

View File

@@ -12,3 +12,9 @@ in every repository as they all contain important information that could help wi
<b>Email:</b> crimsonCyberDefense@gmail.com <br>
<b>Slack:</b> https://bit.ly/2yGRfV5 <br>
<b>Website:</b> uacrimsondefense.github.io
## 0 to 100
With 0 meaning just starting out and 100 meaning being ready to start learning more difficult cybersecurity topics and porblems, this folder is filled with resources and links to guides and videos to get from 0 to 100, real quick. As someone who started out with little to no experience in cybersecurity I can say with confidence that learning the basics before jumping into the more difficult problems is very important!
## Beginner
Learn what cybersecurity is all about. Make sure you check out 0 to 100 if you are brand new to all of this, learning the basics is important!

1
Security+/README.md Normal file
View File

@@ -0,0 +1 @@
# Security+